Home
Products
Blog
Support
Company
Online Help
Online Help
east-tec Eraser
Getting Started
What is east-tec Eraser?
The Dashboard
The Modules
Dashboard Settings
Privacy Guard
Overview
Quick Start
Basic Options and Features
Important Facts
Settings
Erase Actions
Confirmation
Shadow Copies
Policies
Preferences
Security Level
Autodetect
Context Menu
Notification
Hotkeys
Automation
Erase Files And Folders
Overview
Quick Start
Basic Options And Features
Settings
Erase Actions
Confirmation
Shadow Copies
Policies
Preferences
Security Level
Context Menu
Hotkeys
Automation
Erase Deleted Data
Overview
Quick Start
Basic Options and Features
Important Facts
Settings
Confirmation
Preferences
Security Level
Context Menu
Notification
Hotkeys
Automation
Media Wiper
Overview
Basic Options and Features
Settings
Confirmation
Preferences
Security Level
Context Menu
Hotkeys
Automation
Scheduler
Overview
Quick Start
Basic Options and Features
Advanced Program Functions
Changing the Security Level: Wipe Methods
Command-line parameters
Preventing specific data from being erased
Password protection
The stealth (anti-boss) key
Technical Background
Handling the Alternate Data Streams
Creating your own custom sensitive area
Searching for files using filters
Thumbs.db
The slack
Disk areas filled with sensitive information
What does Secure Erase mean?
Protecting your Restore Points
Using a log file
Handling errors
Shadow copies
Licensing
Extend your Subscription
Renew your Subscription
Purchase a Subscription
The License Center